Home News Computer Security: Trends for the year 2019

Computer Security: Trends for the year 2019

Computer security focuses on data protection and privacy, highlighting the role of virtual currencies, machine learning and connected smart devices. The experts share their report on the cyber security issues that will be highlighted during the next year.

“Cyber ​​attacks, data leaks and cases in which failures were reported in the control of the privacy of customers and users during 2018, make clear the challenge of ensuring the protection of assets. Therefore, the practical objectives of information security should be focused on safeguarding the confidentiality, integrity and availability of computer systems and data, “said Camilo Gutierrez, head of the Research Laboratory of ESET Latin America.

The “Trends 2019” report reflects on the importance and responsibility of companies when it comes to protecting the large volumes of data they have collected over the years. 2018 was highlighted in the history of data privacy, because the European Union (EU) made effective the General Data Protection Regulation (GDPR), which has implications for any organization (regardless of its location) that handles personal information of EU citizens. Other parts of the world will take the path of the EU, and also analyze the possibility of the existence of a global law.

In terms of malware, the report highlights that used for illegal cryptocurrency mining for 2019. Although it was not the main topic of 2018, the illegal mining of cryptocurrencies had a growth in terms of propagation (among which the practice known as cryptojacking stands out), which will surely occupy a prominent place in the scenario of threats for next year.

READ  Will the Fight Between VPNs and Geo-restrictions Continue?

On the other hand, the role of smart homes is highlighted through the use of voice assistants. The existing possibilities that criminals can take advantage of IoT devices interconnected in the home and thus invade privacy, in addition to highlighting the role of users linked to the amount and type of data that is shared with these devices.

In this context, the report has a section dedicated to Machine Learning (ML). This technology, which is based on the generation of information from the automated analysis of large volumes of data, also gained space in the field of cyber security. Although the algorithms used could allow developers to identify current threats in a more efficient way, they can also be used by malicious actors to develop automated tasks and obtain information on vulnerable targets. The report explains the potential of this technology for both attackers and those in charge of security.

MicrosoftTop Adminhttps://www.microsofttop.com
Microsoft Top, United States leader in digital marketing and content marketing, presents one of the most complete private portfolios in the market: Consulting, systems integration, software editing and Business Process Services and all about technology. Microsoft Top provides a global response to the challenges of development and competitiveness of large companies and organizations.



Please enter your comment!
Please enter your name here

Must Read

Step by Step: How to Create your Own Business Based on Bitcoin and Cryptomonads

The trades refuge in the speculation and the rises and lows, Bitcoin's business is going beyond. How to join the Cryptophane in...

Get Tinder Plus Free Worth to Pay

We tell you if you can Get Free Tinder Plus. Tinder is free to use and can do a...

Do you remember the dress Lady Gaga took to the Golden Globes? Well, she just went to auction

Garment auctions that belonged to movie or music legends are always very lucrative. This is demonstrated by the $ 300,000 that was paid...

Selena Gomez has something to say to those who suggest she has returned with her ex

Selena Gomez can say a thousand things about her singleness, that the rest of the world will draw a different conclusion. It happened again...

Ways to play on a Mac Almost as well as on a Windows PC

Playing on a Mac is possible even if video games have never been the focus of Apple. So far,...